Xinyi Huang(黄欣沂)
Xinyi Huang(黄欣沂)
School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China
Verified email at fjnu.edu.cn - Homepage
TitleCited byYear
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
International Conference on Cryptology and Network Security, 13-25, 2005
3642005
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
3602013
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3022007
An overview of fog computing and its security issues
I Stojmenovic, S Wen, X Huang, H Luan
Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016
2162016
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
D He, S Zeadally, B Xu, X Huang
IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015
2092015
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
1882014
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
1872010
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
1612017
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
1602014
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
1442014
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
1372016
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
European Public Key Infrastructure Workshop, 110-125, 2007
1362007
Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
1312015
Targeted online password guessing: An underestimated threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1282016
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and security: From theory to applications, 442-464, 2012
1212012
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1132015
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1062014
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
922015
Identity-based proxy signature from pairings
W Wu, Y Mu, W Susilo, J Seberry, X Huang
International Conference on Autonomic and Trusted Computing, 22-31, 2007
912007
Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
X Huang, W Susilo, Y Mu, F Zhang
19th International Conference on Advanced Information Networking and …, 2005
902005
The system can't perform the operation now. Try again later.
Articles 1–20